{"id":"https://openalex.org/W4285412936","doi":"https://doi.org/10.5220/0011266800003283","title":"A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization","display_name":"A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4285412936","doi":"https://doi.org/10.5220/0011266800003283"},"language":"en","primary_location":{"id":"doi:10.5220/0011266800003283","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0011266800003283","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0011266800003283","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026869809","display_name":"Jeyamohan Neera","orcid":null},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Jeyamohan Neera","raw_affiliation_strings":["Department of Computer and Information Sciences, Northumbria University, U.K., --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, U.K., --- Select a Country ---","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100373745","display_name":"Xiaohong Chen","orcid":"https://orcid.org/0000-0002-9797-8384"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Xiaomin Chen","raw_affiliation_strings":["Department of Computer and Information Sciences, Northumbria University, U.K., --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, U.K., --- Select a Country ---","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041150133","display_name":"Nauman Aslam","orcid":"https://orcid.org/0000-0002-9500-3970"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nauman Aslam","raw_affiliation_strings":["Department of Computer and Information Sciences, Northumbria University, U.K., --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, U.K., --- Select a Country ---","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060034165","display_name":"Biju Issac","orcid":"https://orcid.org/0000-0002-1109-8715"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Biju Issac","raw_affiliation_strings":["Department of Computer and Information Sciences, Northumbria University, U.K., --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, U.K., --- Select a Country ---","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108815221","display_name":"Eve O\u2019Brien","orcid":null},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Eve O\u2019Brien","raw_affiliation_strings":["Department of Computer and Information Sciences, Northumbria University, U.K., --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, U.K., --- Select a Country ---","institution_ids":["https://openalex.org/I32394136"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5026869809"],"corresponding_institution_ids":["https://openalex.org/I32394136"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07405648,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"325","last_page":"332"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8725965023040771},{"id":"https://openalex.org/keywords/collaborative-filtering","display_name":"Collaborative filtering","score":0.8311946988105774},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8228046894073486},{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.7953352928161621},{"id":"https://openalex.org/keywords/matrix-decomposition","display_name":"Matrix decomposition","score":0.6580060124397278},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5584226846694946},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4535582363605499},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3890778720378876},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3853028416633606},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.36066386103630066}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8725965023040771},{"id":"https://openalex.org/C21569690","wikidata":"https://www.wikidata.org/wiki/Q94702","display_name":"Collaborative filtering","level":3,"score":0.8311946988105774},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8228046894073486},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.7953352928161621},{"id":"https://openalex.org/C42355184","wikidata":"https://www.wikidata.org/wiki/Q1361088","display_name":"Matrix decomposition","level":3,"score":0.6580060124397278},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5584226846694946},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4535582363605499},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3890778720378876},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3853028416633606},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.36066386103630066},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C158693339","wikidata":"https://www.wikidata.org/wiki/Q190524","display_name":"Eigenvalues and eigenvectors","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.5220/0011266800003283","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0011266800003283","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Security and Cryptography","raw_type":"proceedings-article"},{"id":"pmh:oai:centaur.reading.ac.uk:116496","is_oa":false,"landing_page_url":"https://centaur.reading.ac.uk/view/creators/90012541.html>","pdf_url":null,"source":{"id":"https://openalex.org/S4306402273","display_name":"CentAUR (University of Reading)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71052956","host_organization_name":"University of Reading","host_organization_lineage":["https://openalex.org/I71052956"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:nrl.northumbria.ac.uk:49207","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401884","display_name":"Northumbria Research Link (Northumbria University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I32394136","host_organization_name":"Northumbria University","host_organization_lineage":["https://openalex.org/I32394136"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Book Section"}],"best_oa_location":{"id":"doi:10.5220/0011266800003283","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0011266800003283","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W76789258","https://openalex.org/W1981631259","https://openalex.org/W2009952684","https://openalex.org/W2027595342","https://openalex.org/W2153349750","https://openalex.org/W2160793043","https://openalex.org/W2184617838","https://openalex.org/W2786147743","https://openalex.org/W2788246224","https://openalex.org/W2789607830","https://openalex.org/W2792597990","https://openalex.org/W2896457183","https://openalex.org/W2965373594","https://openalex.org/W2968745142","https://openalex.org/W2981840673","https://openalex.org/W2996428491","https://openalex.org/W3000461606","https://openalex.org/W3013571038","https://openalex.org/W3106302634","https://openalex.org/W3174468255","https://openalex.org/W3211875619"],"related_works":["https://openalex.org/W2772628444","https://openalex.org/W1484355083","https://openalex.org/W2735929803","https://openalex.org/W4220714703","https://openalex.org/W3008845055","https://openalex.org/W2098758514","https://openalex.org/W2170391450","https://openalex.org/W4376854386","https://openalex.org/W2202724490","https://openalex.org/W2508671622"],"abstract_inverted_index":{"Many":[0],"works":[1,37],"have":[2,38,61],"proposed":[3,170],"integrating":[4],"sentiment":[5,106,163],"analysis":[6,107],"with":[7,104,146],"collaborative":[8,102,153],"filtering":[9,103,154],"algorithms":[10],"to":[11,49,54,63,132],"improve":[12],"the":[13,40,55,71,110,114,120,134,137,162],"accuracy":[14,177],"of":[15,57,73,148],"recommendation":[16,98,171,176],"systems.":[17],"As":[18],"a":[19,97,105],"result,":[20],"service":[21,138],"providers":[22],"collect":[23],"both":[24,76],"reviews":[25,77],"and":[26,78,125,156,185],"ratings,":[27],"which":[28],"is":[29],"increasingly":[30],"causing":[31],"privacy":[32,51,72,180],"concerns":[33,52],"among":[34],"users.":[35],"Several":[36],"used":[39],"Local":[41],"Differential":[42],"Privacy":[43],"(LDP)":[44],"based":[45,93],"input":[46,121],"perturbation":[47,94,123],"mechanism":[48,95,117],"address":[50,64],"related":[53],"aggregation":[56],"ratings.":[58],"However,":[59],"researchers":[60],"failed":[62],"whether":[65],"perturbing":[66],"just":[67],"ratings":[68,79],"can":[69],"protect":[70],"users":[74],"when":[75],"are":[80],"collected.":[81],"We":[82,166],"answer":[83],"this":[84,87],"question":[85],"in":[86,96],"paper":[88],"by":[89],"applying":[90],"an":[91],"LDP":[92],"system":[99,172],"that":[100,168],"integrates":[101],"model.":[108,165],"On":[109],"user-side,":[111],"we":[112,141],"use":[113,142],"Bounded":[115],"Laplace":[116],"(BLP)":[118],"as":[119,151,161],"rating":[122,186],"method":[124],"Bidirectional":[126],"Encoder":[127],"Representations":[128],"from":[129],"Transformers":[130],"(BERT)":[131],"tokenize":[133],"reviews.":[135],"At":[136],"provider\u2019s":[139],"side,":[140],"Matrix":[143],"Factorization":[144],"(MF)":[145],"Mixture":[147],"Gaussian":[149],"(MoG)":[150],"our":[152,169],"algorithm":[155],"Convolutional":[157],"Neural":[158],"Network":[159],"(CNN)":[160],"classification":[164],"demonstrate":[167],"model":[173],"produces":[174],"adequate":[175],"under":[178],"strong":[179],"protection":[181],"using":[182],"Amazon\u2019s":[183],"review":[184],"datasets.":[187]},"counts_by_year":[],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
